Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Best Damn Firewall Book Period, Second Edition
The Best Damn Firewall Book Period, Second Edition
The Second Edition of the Best Damn Firewall Book Period is completely revised and updated to include all of the most recent releases from Microsoft, Cisco, Juniper Network, SonicWALL, and Check Point.

Compiled from the best of the Syngress firewall library and authored by product experts such as Dr. Tom Shinder on ISA Server, this
...
Mobile TV: DVB-H, DMB, 3G Systems and Rich Media Applications
Mobile TV: DVB-H, DMB, 3G Systems and Rich Media Applications
Exclusively dedicated to Mobile TV, this book provides a detailed insight to mobile multimedia characterized efficient compression techniques, protocols formalized by 3GPP or 3GPP2, capabilities of broadcast, and mobile networks for delivering multimedia content. Network requirements such as spectrum; chipsets, software and handsets which enable...
trixbox CE 2.6
trixbox CE 2.6

The open source telephony platform trixbox CE is designed to implement a PBX system with features typically reserved for large enterprise businesses. trixBox allows an individual or organization to set up a telephone system with traditional telephone networks as well as internet-based telephony or VoIP. The task is time consuming and involves a...

Dengue Virus (Current Topics in Microbiology and Immunology)
Dengue Virus (Current Topics in Microbiology and Immunology)

Scientific research on dengue has a long and rich history. The literature has been touched by famous names in medicine- Benjamin Rush, Walter Reed, and Albert Sabin, to name a very few- and has been fertile ground for medical historians . The advances made in those early investigations are all the more remarkable for the limited tools available...

Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach
Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach

“In this book, the authors adopt a refreshingly new approach to explaining the intricacies of the security and privacy challenge that is particularly well suited to today’s cybersecurity challenges. Their use of the threat–vulnerability–countermeasure paradigm combined with...

Return of the Grizzly: Sharing the Range with Yellowstone's Top Predator
Return of the Grizzly: Sharing the Range with Yellowstone's Top Predator
The Yellowstone grizzly population has grown from an estimated 136 bears when first granted federal protection as a threatened species to as many as 1,000 grizzlies in a tri-state region today. No longer limited to remote wilderness areas, grizzlies now roam throughout the region—in state parks, school playgrounds, residential...
Cryptography: A Very Short Introduction
Cryptography: A Very Short Introduction

We are surrounded by cryptography, from the ATM, where we withdraw cash, mobile phones, and the Internet, to workplace security systems that protect business secrets, and the civil and military codes that protect the skies above us.

In this fascinating introduction to how cryptography actually works, Fred Piper and Sean Murphy highlight...

Understanding DB2 9 Security
Understanding DB2 9 Security
Understanding DB2 9 Security is the only comprehensive guide to securing DB2 and leveraging the powerful new security features of DB2 9. Direct from a DB2 Security deployment expert and the IBM® DB2 development team, this book gives DBAs and their managers a wealth of security information that is available nowhere else. It presents real-world...
Mastering Windows Vista Business: Ultimate, Business, and Enterprise
Mastering Windows Vista Business: Ultimate, Business, and Enterprise
In-depth Coverage of Windows Vista Ultimate, Business, and Enterprise

Learn to install, configure, run, and troubleshoot the professional versions of Vista in this comprehensive new guide from two leading Windows authorities. From Vista's all-new interface, 32-bit/64-bit architecture, and advanced security features to its fantastic new...

Before Prozac: The Troubled History of Mood Disorders in Psychiatry
Before Prozac: The Troubled History of Mood Disorders in Psychiatry
Psychiatry today is a barren tundra, writes medical historian Edward Shorter, where drugs that don't work are used to treat diseases that don't exist. In this provocative volume, Shorter illuminates this dismal landscape, in a revealing account of why psychiatry is "losing ground" in the struggle to treat depression.

...
Service Life and Durability of Reinforced Concrete Structures: Selected Papers of the 8th International RILEM PhD Workshop held in Marne-la-Vallée, ... September 26-27, 2016 (RILEM Bookseries (17))
Service Life and Durability of Reinforced Concrete Structures: Selected Papers of the 8th International RILEM PhD Workshop held in Marne-la-Vallée, ... September 26-27, 2016 (RILEM Bookseries (17))

This volume contains the proceedings of the 8th International PhD Student Workshop on Service Life and Durability of Reinforced Concrete Structures that was held in Marne-la-Vallée, France, on September the 26th and 27th 2016.

Topics discussed in the book are related to durability performance of reinforced...

Cryptographic Security Architecture: Design and Verification
Cryptographic Security Architecture: Design and Verification
This book describes various aspects of cryptographic security architecture design, with a
particular emphasis on the use of rigorous security models and practices in the design. The
first portion of the book presents the overall architectural basis for the design, providing a
general overview of features such as the object model and
...
Result Page: 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy